β International Authorities Take Down Flubot Malware Network β
π Read
via "Threat Post".
The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020.π Read
via "Threat Post".
Threat Post
International Authorities Take Down Flubot Malware Network
The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020.
β Scammers Target NFT Discord Channel β
π Read
via "Threat Post".
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.π Read
via "Threat Post".
Threat Post
Scammers Target NFT Discord Channel
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.
β Cybercriminals Expand Attack Radius and Ransomware Pain Points β
π Read
via "Threat Post".
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.π Read
via "Threat Post".
Threat Post
Cybercriminals Expand Attack Radius and Ransomware Pain Points
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.
π΄ Neutralizing Novel Trickbot Attacks With AI π΄
π Read
via "Dark Reading".
Artificial intelligence technology can detect the latest wave of Trickbot ransomware and block the attack before it causes damage.π Read
via "Dark Reading".
Dark Reading
Neutralizing Novel Trickbot Attacks With AI
Artificial intelligence technology can detect the latest wave of Trickbot ransomware and block the attack before it causes damage.
π1
π΄ Fighting Follina: Application Vulnerabilities and Detection Possibilities π΄
π Read
via "Dark Reading".
Although organizations should perform proper risk analysis and patch as soon as practical after there's a fix for this vulnerability, defenders still have options before that's released.π Read
via "Dark Reading".
Dark Reading
Fighting Follina: Application Vulnerabilities and Detection Possibilities
Although organizations should perform proper risk analysis and patch as soon as practical after there's a fix for this vulnerability, defenders still have options before that's released.
β Yet another zero-day (sort of) in Windows βsearch URLβ handling β
π Read
via "Naked Security".
More trouble with special-purpose URLs on Windows.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ 'Clipminer' Malware Actors Steal $1.7 Million Using Clipboard Hijackingp π΄
π Read
via "Dark Reading".
The malware targets Windows users via Trojanized downloads of cracked or pirated software and then starts in on cryptocurrency mining and clipboard hijacking.π Read
via "Dark Reading".
Dark Reading
'Clipminer' Malware Actors Steal $1.7 Million Using Clipboard Hijacking
The malware targets Windows users via Trojanized downloads of cracked or pirated software and then starts in on cryptocurrency mining and clipboard hijacking.
β Yet another zero-day (sort of) in Windows βsearch URLβ handling β
π Read
via "Naked Security".
More trouble with special-purpose URLs on Windows.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β S3 Ep85: Now THATβS what I call a Microsoft Office exploit! [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2022-27780 βΌ
π Read
via "National Vulnerability Database".
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-29653 βΌ
π Read
via "National Vulnerability Database".
OFCMS v1.1.4 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/comn/service/update.json.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29659 βΌ
π Read
via "National Vulnerability Database".
Responsive Online Blog v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at single.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30819 βΌ
π Read
via "National Vulnerability Database".
In Wedding Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of "photos_edit.php" file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29711 βΌ
π Read
via "National Vulnerability Database".
LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26974 βΌ
π Read
via "National Vulnerability Database".
Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing a file upload mechanism. Lack of input sanitization in the upload mechanism leads to reflected XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29729 βΌ
π Read
via "National Vulnerability Database".
Verizon 4G LTE Network Extender GA4.38 - V0.4.038.2131 utilizes a weak default admin password generation algorithm which generates passwords that are accessible to unauthenticated attackers via the webUI login page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30825 βΌ
π Read
via "National Vulnerability Database".
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\client_edit.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30490 βΌ
π Read
via "National Vulnerability Database".
Badminton Center Management System V1.0 is vulnerable to SQL Injection via parameter 'id' in /bcms/admin/court_rentals/update_status.php.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26971 βΌ
π Read
via "National Vulnerability Database".
Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing a license file upload mechanism. This upload can be executed without authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26976 βΌ
π Read
via "National Vulnerability Database".
Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing a license file upload mechanism. Lack of input sanitization in the upload mechanism is leads to reflected XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26491 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.π Read
via "National Vulnerability Database".